Articles about Q&A

Why networking technologies remain at the heart of online security [Q&A]

Networked computers

Networks and the internet are reliant on domain name servers, dynamic host control protocol, and IP address management. These three technologies -- grouped together as DDI (DNS, DHCP, IPAM) -- are central to the way things work but that also makes them a tempting target.

We spoke to Ronan David, chief of strategy at EfficientIP to find out why DDI is so vital to online security and how automation can help with defense.

Continue reading

The changing role of the CISO [Q&A]

CISO

Digital transformation, a shift to hybrid and remote working, and increasing regulatory pressure have seen major changes to the enterprise IT landscape in recent years.

CISOs have been at the heart of this, facing new challenges and taking on additional responsibilities. We spoke to Ben Smith, field CTO of NetWitness, to discuss these changes and find out what makes a good, or bad, CISO.

Continue reading

SaaS and what it can teach us about human behavior [Q&A]

SaaS

Software-as-a-service has become increasingly popular and the market for it is still growing -- expected to reach $264 billion (£207 billion) by 2026.

SaaS sales are being driven by more companies continuing to digitize their operations in a post-COVID-19 world. We spoke to Paul Quigley, CEO and co-founder of predictive, real-time media monitoring platform NewsWhip, to discover how using SaaS can improve operations for a company, help grow the business, and even offer insights into human behavior.

Continue reading

How IT can fix the employee experience [Q&A]

home working

The world of work has changed quite considerably over the past few years, driven by a number of factors, not least the pandemic.

Many of these changes have been positive, but some, in particular the shift to hybrid working, have brought challenges too. Some tasks are simply more difficult to do remotely.

Continue reading

Good backups are critical to recovering from ransomware

Backup key

A new report from Enterprise Strategy Group (ESG), sponsored by Keepit, shows that granular and air-gapped backup are critical to data recovery when businesses are hit by ransomware.

Of more than 600 respondents to the survey, 79 percent have experienced a ransomware attack within the last year, with 17 percent experiencing attacks weekly and 13 percent daily.

Continue reading

Outsmarting the new generation of online fraudsters [Q&A]

Fraud

Millions of dollars are lost to online scams each year and the fraudsters are getting ever more sophisticated in the targeting of their attacks.

Much of today's fraud is executed using information about the consumer's habits and personal details, usually captured in phishing attacks or data breaches. The fact that we’re conducting more of our transactions online as a result of the pandemic has created even more opportunity for fraudsters.

Continue reading

Behavioral analytics and why it's important to threat detection and response [Q&A]

AI security

Traditional rule-based security techniques centered on malware signatures and perimeter protection are increasingly unable to cope with the latest, more sophisticated threats.

Taking a more behavior-based approach to spotting unusual or risky activity offers a solution, but what is required to make it work? We spoke to Sanjay Raja, VP of product marketing and solutions at cybersecurity specialist Gurucul, to find out.

Continue reading

What Log4Shell still means for the enterprise [Q&A]

Laptop security

When the Log4Shell vulnerability first appeared at the end of last year it sent a shockwave through the cybersecurity community.

But just because it's no longer in the headlines doesn't mean it's gone away. There's still a lot that enterprises can learn from the vulnerability and the response to it. We spoke to Maninder Singh, corporate vice president and global head of cybersecurity and GRC services at HCL Technologies, to find out more.

Continue reading

Lessons the military can bring to cybersecurity [Q&A]

The ongoing struggle between good and bad actors in the cyber world has often been compared to a battle or warfare. More recently the threat of nation state attacks on critical infrastructure has led to more actual military interest in the cyber arena, as we've seen in Ukraine.

The Israel Defense Force's 8200 unit is often referred to the SEALs or SAS of cyber military units and its veterans are driving many of Israel's tech start ups.

Continue reading

How hybrid work will fuel the adoption of DaaS [Q&A]

home working security

Hybrid work is here to stay, and as companies deploy virtual desktops to enable work from anywhere, IT teams are increasingly challenged with securing their network and sensitive data.

We spoke with Tim Minahan, executive vice president of business strategy at Citrix, about how work has changed and how the technologies and policies used to support it need to change with it.

Continue reading

The challenges of vulnerability management [Q&A]

open digital lock

Recent vulnerabilities like Log4j have highlighted how difficult it can be to manage risks and ensure that software patches are kept up to date.

We spoke to Rob Gurzeev, CEO of attack surface management specialist CyCognito, to discuss the challenges involved and how to deal with them.

Continue reading

Why enterprises need to consolidate their cybersecurity efforts [Q&A]

DevSecOps

With the COVID-19 pandemic and drive for digital transformation the shift to a new distributed workforce model continues at pace.

But this can also leave businesses vulnerable as attack vectors have become more sophisticated -- resulting in a continued shortage of security experts.

Continue reading

The problem with AI model failure and how to avoid it [Q&A]

Artificial intelligence

It's tempting to look at the hype surrounding AI and see it as a solution to all problems. But AI isn't perfect, there have been some notable failures, often due to poorly defined models.

What are the consequences of getting it wrong, and how can businesses ensure their AI projects stay on track? We spoke to Alessya Visnjic, CEO of AI observability specialist WhyLabs to find out.

Continue reading

The challenge of hiring cyber talent in the Great Resignation [Q&A]

Vacant chair

Whether it's been triggered by the pandemic or other factors, the Great Resignation has led to new problems for businesses when it comes to finding and retaining staff.

This has been a particular problem in the tech sector where employees tend to be quite mobile anyway. We spoke to Amar Kanagaraj, founder and CEO of Protecto, to find out how businesses can meet the challenges of hiring tech talent.

Continue reading

How PSD2 is changing open banking [Q&A]

online banking

Compliance with the EU Payments Services Directive (PSD2) is the next key milestone in the continued evolution of open banking. This evolution involves a new set of rules that will change how we confirm our identity when making purchases online.

The implementation of strong customer authentication (SCA), on top of existing open banking capabilities, will require merchants and payment service providers (PSPs) to work together with technology suppliers, card schemes and many others to deliver SCA in a way which works well for customers.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.